Homepage
Open in app
Sign in
Get started
MII Cyber Security Consulting Services
Tale Stories of Our Journey in Cyber Security Industry
Offensive
Defensive
Microsoft Security
Research
Write-Up
Follow
Efficiently Parsing Nessus Data
Efficiently Parsing Nessus Data
Hello everyone, I want to share how I process a lot of data from various segments in my vulnerability assessment project using Nessus. In…
Rio Darmawan
Jul 7
Server-Side Template Injection
Server-Side Template Injection
Information about Server-Side Template Injection
Bryan RB
Jun 20
Leveraging ExifTool to Modify File Metadata and Inject XSS
Leveraging ExifTool to Modify File Metadata and Inject XSS
What is Exiftool?
Vincent ie
Jun 11
Pivoting and Lateral Movement Faster with Ligolo-ng
Pivoting and Lateral Movement Faster with Ligolo-ng
0x1 Introduction
Bukhari Hasan
Jun 2
Nahamcon-CTF 2024 — Forensic (1)
Nahamcon-CTF 2024 — Forensic (1)
Last week, I participated in the NahamCon 2024 CTF, focusing specifically on the forensic challenges. These challenges are designed to…
Faishol Hakim
Jun 2
Active Directory Enumeration from Non-Joined Domain Workstation
Active Directory Enumeration from Non-Joined Domain Workstation
During a Red Teaming Assume Breach engagement, there is a possibility that the client provides you with access to a workstation as a…
Problem Child
May 29
Android Emulator Setup for PenTest Using Android Studio
Android Emulator Setup for PenTest Using Android Studio
Welcome to the definitive guide on setting up your Android emulator for penetration testing using Android Studio!
Rafel
May 6
About MII Cyber Security Consulting Services
Latest Stories
Archive
About Medium
Terms
Privacy
Teams